Total Security Summit

Upcoming Event Dates


Fit a year's worth of meetings in at this action-packed networking event. There is no registration cost for qualified delegate attendees.


Who attends:  This event is specifically designed for Security decision-makers (Manager, Director, or VP), who have projects in the pipeline and are actively sourcing solutions

What you can expect:

  • Meet one-on-one with solution providers specific to your current project needs
  • Attend workshops and sessions
  • Network with peers from leading companies
  • Receive complimentary event registration, hotel accommodations, and meals at a luxury venue

How it works:

  • You select the solution providers you're most interested in meeting
  • Your interests shape your agenda of one-on-ones and sessions
  • We continue to add workshops up until the event
  • We cap our attendance at 50 spots
  • We hold the event twice a year and rotate regionally

Why you should attend as a delegate:

  • It's a more efficient way to source solution providers, and to get custom attention specific to your needs
  • You'll make profitable connections to help further your business goals
  • You'll stay up-to-date about the latest trends and technology advances in your industry


Forum Events has 20+ years of experience holding successful events across multiple markets. We're dedicated to providing you with a complete VIP experience from start to finish.


For More Information Please Contact...

Madeline Kinney – Delegate Coordinator
(941) 925-7585 x8169  |  email

Tyler Flatt – Event Manager
1-800-274-6774 ext. 8983  |  email

Sample of Current and Past Vendors

Total Security Summit in Phoenix, AZ
November 18-19, 2019

Event Workshops Include...

Building Automation System Total Solution
Presented by Kelly Jenkins - Delta Controls

All in one integrated system for Building Control, Energy Management Automation, Smart Room Controls, Lighting Control, Access Control and Security Cameras. Integrated into a "Total Solution".

Who's Got the Ball
Presented by Wayne Dorris - Axis Communications

Managing emerging threats and mitigating risk is a constant process that requires a long-term mindset. Cyber lifecycle management should include defined processes to manage and secure devices on your clients’ network, aligning with the companies Information Security policies.

In this session, attendees will learn about the impact of the threats, managing firmware and change management for network services, identifying responsibilities for cybersecurity implementation and how to create the framework for a long-term cybersecurity strategy

Construction & Security Trends in 2019 and Beyond -- Learn How These Business Segments are Evolving with Technology
Presented by Jasmine Jones - Assa Abloy

Learn about:

  • The changing construction world…operating more efficiently
  • LEED & Sustainability…how is security becoming involved?
  • Cell phones, credentials and access control

The Puppy Dog Movement - Hiding Security in Plain Sight
Presented by Presented by Doug Haines, MPSE. Owner - Haines Security Solutions

Criminal activities, including terrorism, have changed over the course of the last few years. It has gone from the brazen “big ticket” attack to the lesser “smaller softer targets”. Great strides have been made in electronic technologies but it’s not enough to be able to identify past perpetrators through facial recognition in the public space. Additionally, some law enforcement agencies are receiving push-back from their communities on the use of surveillance systems and its broad collection of data. These new technologies cause privacy concerns. Recent research shows that almost all electronic data is never used. It’s collected, stored and eventually thrown away. Shouldn’t we be using technologies that don’t contribute to this waste?

This session explores “soft security engineering” or, in other words, using non-electronic technologies to assist in the deterrence and prevention of crime, and goes beyond Crime Prevention Through Environmental Design (CPTED) concepts.

Low Energy Operators, Exit Devices and Exit Alarms
Presented by Scott Peck - Detex Corporation

This informative course will cover:

  • When and where to specify
  • Understanding requirements of the application
  • What products to use that will give the best value and provide a correct and complete installation
  • What will be needed for the designated installation location
  • Recognition of possible installation problems and what will be needed to overcome these problems
  • The installation and usage of all other support equipment that may be required, such as electrified panic hardware, wireless push button, etc.

Cyber Security – Understanding the Defense in Depth model for video surveillance
Presented by Matt Terry - Hanwha Techwin America

It is important to understand the risks associated with putting new devices on a network, and the considerations to securing a network while still achieving ease of access and maintenance.

Attendees of this session will:

  • Learn about the concept of Defense in Depth security
  • Understand the risks associated with default settings found in many devices
  • Discover ways to monitor a network securely
  • Identify a maintainable video surveillance system

The Good, the Bad and the Ugly of Multi Site Roof Management
Presented by Josh Mock & Calvin Jester - North American Roofing

Facility Managers will learn best practices and get key knowledge of modern roofing options, systems, and sevices designed to make managing facilities easier and more affordable.

Staying Ahead of the Game – Leveraging the Benefits of Digital Security Operations for Improved Business Insights, Better Service, & a Winning Competitive Advantage
Presented by Christophe Kloussing - Vice President, North America for Trackforce

This interactive workshop will cover:

  • Identifying and overcoming foremost challenges faced by security companies: overtime and coverage issues, emergency response, payroll and billing
  • Automating billing and payroll with the click of a button
  • How a Command Center is used to increase readiness and reduce emergency response time
  • Ways security professionals have used analytics, business intelligence, and a real-time dashboard to mitigate risk
  • Optimizing client trust with digital reporting
  • Lasting techniques to improve security business with technology

Improving Your Roof and Pavement Assets While Spending Less
Presented by Jim McNulty - Bluefin LLC

Managing your roofs through a structured asset management approach can significantly extend roof life for any roof system while improving reliability and saving money. We will discuss an approach that large building owners are using throughout North America on over 1B square feet of roofs. Examples will be provided.


Renaissance Phoenix Downtown Hotel

100 North 1st Street
Phoenix, AZ 85004

Website  |  Map & Directions

Phoenix, AZ

November 18-19, 2019

Sample of Current and Past Vendors

Areas Covered

  • Access Control
    Access Control Power Solutions, Alarm Systems, Biometrics, Building Management Systems, Card Readers, Cash Handling, Exit Alarms, Exit Devices, ID Card Printers, ID Systems & supplies, Key Management/Key Holding, License Plate Recognition , Locks & Locking Systems, Security Doors and Windows, Smart Cards & ID Cards
  • Business Continuity & Risk Management
    Business Continuity, Crisis Management, Disaster Recovery, Emergency Planning, Fire Risk Assessment, Health & Safety
  • CCTV
    Cameras, CCTV Maintenance, Digital Video Recorders, IP Cameras, Mega Pixel Cameras, Multiplexers, Remote Video Monitoring, Surveillance & Monitoring, Thermal Imaging, Video Analytics
  • Cyber/IT Security
    Audit Security, Backup Data Storage/Solutions, Biometric, Computer Forensics, Computer Network Security, Contingency Planning, Data Security, Firewalls, Hackers, Identity Management, Incident Response/Management, Information Security Management, Information Security Management, Intrusion Protection, IP Networks, IP/TCP/Ethernet Systems, Malware, Media Protection, Mobile Security, Network Access Control, Network Behavior Analysis, Network Security, Networked Storage Systems, Remote Access, Risk Assessment, Security Policy, Threat Analysis, Video Servers, Virus Detection, Visitor ID Systems, Wireless Access Control, Wireless Applications
  • Fire Solutions
    Emergency Lighting, Fire Alarms, Fire Doors, Fire Safety Equipment
  • Lone Worker Security
    Close Protection, Guard Tour Verification, Manned Guarding, Mobile Communications
  • Perimeter Security
    Barriers & Turnstiles, Cages/Enclosure, Fencing & Gates, Glazing Solutions, Intrusion Detection, Maintenance, Secure Lobbies, Shutters & Grills
  • Specialist
    Access Control Managed Power Solutions, Asset Protection, Concealed Weapons Detection, Corporate Threat Assessment & Management, Crime Risk Assessment, Executive Protection, Incident Management, Integrated Systems, Lockdown Solutions, Loss Prevention, Low Voltage Products, Mass Emergency Notification, Physical Protective Security, Safes, Security Consultants, Security Resource Planning
  • Transit Security
    Armored Vehicle, Maritime Security, Tracking Systems, Transmission Equipment, Vehicle Cameras, Vehicle Security

Latest Press Release

BLR’s Forum Events Adds Additional Dates for Total Security Summit and Facilities Management Summit

posted by Ericka Howard on Monday Mar 4, 2019

By Ericka Howard | Product Manager, Digital Media and Events Additional dates are added to the Forum events lineup in the Security and Facilities Management sectors, with similar events specific to the Education and Healthcare industries eliminated, to target a larger market of professionals. Old Saybrook, CT – Forum Events, a leading networking event offering that provides opportunities...